Skip to main content

Showing 1–11 of 11 results for author: Bremler-Barr, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01852  [pdf, other

    cs.NI cs.CR cs.LG

    Non-uniformity is All You Need: Efficient and Timely Encrypted Traffic Classification With ECHO

    Authors: Shilo Daum, Tal Shapira, Anat Bremler-Barr, David Hay

    Abstract: With 95% of Internet traffic now encrypted, an effective approach to classifying this traffic is crucial for network security and management. This paper introduces ECHO -- a novel optimization process for ML/DL-based encrypted traffic classification. ECHO targets both classification time and memory utilization and incorporates two innovative techniques. The first component, HO (Hyperparameter Op… ▽ More

    Submitted 5 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2403.01586  [pdf, other

    cs.CR cs.NI

    IoT Device Labeling Using Large Language Models

    Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira

    Abstract: The IoT market is diverse and characterized by a multitude of vendors that support different device functions (e.g., speaker, camera, vacuum cleaner, etc.). Within this market, IoT security and observability systems use real-time identification techniques to manage these devices effectively. Most existing IoT identification solutions employ machine learning techniques that assume the IoT device, l… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

  3. arXiv:2212.01598  [pdf, other

    cs.CR cs.NI

    It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact

    Authors: Bar Meyuhas, Anat Bremler-Barr, David Hay, Shoham Danino

    Abstract: This paper investigates how and with whom IoT devices communicate and how their location affects their communication patterns. Specifically, the endpoints an IoT device communicates with can be defined as a small set of domains. To study how the location of the device affects its domain set, we distinguish between the location based on its IP address and the location defined by the user when regis… ▽ More

    Submitted 15 December, 2022; v1 submitted 3 December, 2022; originally announced December 2022.

  4. arXiv:2106.00606  [pdf, other

    eess.SP cs.LG

    Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT Architectures

    Authors: Eli Brosh, Elad Wasserstein, Anat Bremler-Barr

    Abstract: Monitoring medical data, e.g., Electrocardiogram (ECG) signals, is a common application of Internet of Things (IoT) devices. Compression methods are often applied on the massive amounts of sensor data generated prior to sending it to the Cloud to reduce the storage and delivery costs. A lossy compression provides high compression gain (CG), but may reduce the performance of an ECG application (dow… ▽ More

    Submitted 2 April, 2022; v1 submitted 30 May, 2021; originally announced June 2021.

    Comments: NOMS 2022 - Manage-IoT

  5. arXiv:2005.09107  [pdf

    cs.CR

    NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

    Authors: Yehuda Afek, Anat Bremler-Barr, Lior Shafir

    Abstract: This paper exposes a new vulnerability and introduces a corresponding attack, the NoneXistent Name Server Attack (NXNSAttack), that disrupts and may paralyze the DNS system, making it difficult or impossible for Internet users to access websites, web e-mail, online video chats, or any other online resource. The NXNSAttack generates a storm of packets between DNS resolvers and DNS authoritative nam… ▽ More

    Submitted 29 September, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

  6. arXiv:1911.00253  [pdf, other

    cs.NI

    NFV-based IoT Security for Home Networks using MUD

    Authors: Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev

    Abstract: A new scalable ISP level system architecture to secure and protect all IoT devices in a large number of homes is presented. The system is based on whitelisting, as in the Manufacturer Usage Description (MUD) framework, implemented as a VNF. Unlike common MUD suggestions that place the whitelist application at the home/enterprise network, our approach is to place the enforcement upstream at the pro… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  7. arXiv:1910.05647  [pdf, other

    cs.NI

    IoT or NoT: Identifying IoT Devices in a ShortTime Scale

    Authors: Anat Bremler-Barr, Haim Levy, Zohar Yakhini

    Abstract: In recent years the number of IoT devices in home networks has increased dramatically. Whenever a new device connects to the network, it must be quickly managed and secured using the relevant security mechanism or QoS policy. Thus a key challenge is to distinguish between IoT and NoT devices in a matter of minutes. Unfortunately, there is no clear indication of whether a device in a network is an… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    Comments: 9 pages in total

  8. arXiv:1910.00975  [pdf, other

    cs.CR

    Eradicating Attacks on the Internal Network with Internal Network Policy

    Authors: Yehuda Afek, Anat Bremler-Barr, Alon Noy

    Abstract: In this paper we present three attacks on private internal networks behind a NAT and a corresponding new protection mechanism, Internal Network Policy, to mitigate a wide range of attacks that penetrate internal networks behind a NAT. In the attack scenario, a victim is tricked to visit the attacker's website, which contains a malicious script that lets the attacker access the victim's internal ne… ▽ More

    Submitted 3 October, 2019; v1 submitted 2 October, 2019; originally announced October 2019.

  9. arXiv:1702.08037  [pdf, other

    cs.NI

    Detecting Heavy Flows in the SDN Match and Action Model

    Authors: Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff

    Abstract: Efficient algorithms and techniques to detect and identify large flows in a high throughput traffic stream in the SDN match-and-action model are presented. This is in contrast to previous work that either deviated from the match and action model by requiring additional switch level capabilities or did not exploit the SDN data plane. Our construction has two parts; (a) how to sample in an SDN match… ▽ More

    Submitted 26 February, 2017; originally announced February 2017.

  10. arXiv:1612.02636  [pdf, other

    cs.CR cs.NI

    Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection

    Authors: Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Shir Landau Feibish, Michal Shagam

    Abstract: Motivated by a recent new type of randomized Distributed Denial of Service (DDoS) attacks on the Domain Name Service (DNS), we develop novel and efficient distinct heavy hitters algorithms and build an attack identification system that uses our algorithms. Heavy hitter detection in streams is a fundamental problem with many applications, including detecting certain DDoS attacks and anomalies. A (c… ▽ More

    Submitted 8 December, 2016; originally announced December 2016.

  11. arXiv:1011.2324  [pdf, ps, other

    cs.NI

    On the Dynamics of IP Address Allocation and Availability of End-Hosts

    Authors: Oded Argon, Anat Bremler-Barr, Osnat Mokryn, Dvir Schirman, Yuval Shavitt, Udi Weinsberg

    Abstract: The availability of end-hosts and their assigned routable IP addresses has impact on the ability to fight spammers and attackers, and on peer-to-peer application performance. Previous works study the availability of hosts mostly by using either active **ing or by studying access to a mail service, both approaches suffer from inherent inaccuracies. We take a different approach by measuring the IP… ▽ More

    Submitted 10 November, 2010; originally announced November 2010.